While the Pentagon is pointing its finger at China for hacking and cyberespionage, a Reuters report claims China's not the only cyber-devil...we are too. In fact, the U.S. government is the 'biggest buyer' of zero-days and hacking tools. When it comes to exploiting zero-days for cyberweapons and cyber-spying, China’s not the only “devil”…we are too, according to a Reuters report that claimed the U.S. government is the “biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers.”For the first time, the Pentagon’s annual report to Congress [pdf] accused the Chinese government and military of targeting U.S. government and defense networks as well as using cyber espionage to get its hands on cutting-edge military technology. While this is not new news, it’s new for the Pentagon’s report. Also not new was China’s reaction, calling the accusations “groundless” and “hype.”Some security experts were openly skeptical of the Pentagon’s report, which did not mention what cyberspying the U.S. does in return. The U.S. spends billions every year on “cyberdefense and constructing increasingly sophisticated cyberweapons.” NSA chief General Keith Alexander told Congress that the U.S. is “creating more than a dozen offensive cyberunits, designed to mount attacks, when necessary, at foreign computer networks.” Reuters added that the NSA and Department of Defense are “spending so heavily for information on holes in commercial computer systems, and on exploits taking advantage of them, that they are turning the world of security research on its head.”An unnamed, former defense contractor for the U.S. said, “My job was to have 25 zero-days on a USB stick, ready to go.” Although intelligence agencies code some of their own zero-day exploits, Reuters said, “Private companies have also sprung up that hire programmers to do the grunt work of identifying vulnerabilities and then writing exploit code. The starting rate for a zero-day is around $50,000, some buyers said, with the price depending on such factors as how widely installed the targeted software is and how long the zero-day is expected to remain exclusive.” Vendors at secret snoop conferences pimp a variety of products to assist law enforcement and intelligence agencies in spying. Vupen, which is well-known for selling zero-day exploits exclusively to governments, recently sent 12 researchers to an offensive hacking techniques conference where attendees heard talks such as “Advanced Heap Manipulation in Windows 8.” While the U.S. government sent more than a dozen people to the conference, it’s unknown whether the acquired knowledge or products are intended for spying on other governments or deploying malware for eavesdropping and remote searches, aka virtual force and Trojan horse warrants.ReVuln is newer to the exploits-for-sale game than Vupen, but “specializes in crafting exploits for industrial control systems that govern everything from factory floors to power generators.” When “asked if they would be troubled if some of their programs were used in attacks that caused death or destruction, they said: ‘We don’t sell weapons, we sell information. This question would be worth asking to vendors leaving security holes in their products’.” The Reuters’ article warned there are “unintended consequences” when the U.S. chooses to exploit a vulnerability instead of warning the public about the hole. If and when other countries discover the vulnerability, it could be reverse-engineered and used against U.S. corporations. One such example was the Duqu malware that was “designed to steal industrial-facility designs from Iran.” Duqu was copied by cybercriminals, who then “rolled it into ‘exploit kits,’ including one called Blackhole and another called Cool.” Despite Microsoft issuing a patch, F-Secure reported that “hackers used it last year to attack 16 out of every 1,000 U.S. computers and an even greater proportion in some other countries.”Security researchers are increasingly reluctant to publicly report zero-days for no compensation. The vulnerability might be worth a small fortune after all; and even though Google and Facebook pay “bounties,” the companies say “they are hard-pressed to compete financially with defense-industry spending.”Reuters reviewed a product catalogue from one large contractor, which was made available on condition the vendor not be named. Scores of programs were listed. Among them was a means to turn any iPhone into a room-wide eavesdropping device. Another was a system for installing spyware on a printer or other device and moving that malware to a nearby computer via radio waves, even when the machines aren’t connected to anything.There were tools for getting access to computers or phones, tools for grabbing different categories of data, and tools for smuggling the information out again. There were versions of each for Windows, Apple and Linux machines. Most of the programs cost more than $100,000, and a solid operation would need several components that work together. The vast majority of the programs rely on zero-day exploits.ChinaDaily reported on the intensifying war of words between the U.S. and China regarding cyberattacks. “Rick Falkvinge, a Swedish tech entrepreneur and politician, said Washington ‘needs to clean up its own act before trying to assert the moral high ground over the Chinese for their alleged hack attacks on the U.S.'” Falkvinge added that “the U.S.-led Echelon program, a system to intercept communications, is used by the U.S. not only for military purposes but also to give U.S. industries ‘the upper hand in purely industrial applications, in competition with international counterparts.'”Other critics say the U.S. has no room to point fingers about cyberweapons after Stuxnet. America is “home to largest number of botnets” according to McAfee. PressTV reported, “Data from Germany’s Deutsche Telekom shows that far more attacks against its networks come from the United States. U.S.-based HostExploit, which detects and exposes internet malpractice, also says the U.S. has the world’s most malicious servers.”The Reuters special report “U.S. cyberwar strategy stokes fear of blowback” is interesting and well worth your time to read it.Like this? Here’s more posts:Journalist threatened, warned not to write about face-recognition at Statue of LibertyMicrosoft confirms zero-day vulnerability exploiting IE8Skype accounts easily hijacked via Skype Support, warns hackerMicrosoft: What are people really asking for when they ask for a Start button?Post Boston: Privacy advocates warn about coming tsunami of surveillance camerasOfficials to investigate DHS ammunition purchases Verizon report: China behind 96% of all cyber-espionage data breachesFormer FBI agent: All phone calls recorded, no digital communication secureMicrosoft: Facebook Home is a copycat, Windows Phone is the ‘real thing’AV-Test issues first Windows 8 antivirus solution ratingsGoogle’s patent for email snooping? Microsoft offers your boss email spying powers now Hacktivists take on ‘Olympus Has Fallen’ scare tactics styleFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe